• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/40

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

40 Cards in this Set

  • Front
  • Back
In a PON setup, the system is considered passive because no repeaters or other devices intervene between the carrier and the customer.
True
The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?​

FCS

Wireshark or any other monitoring software running on a single computer connected to a switch doesn't see all the traffic on a network, but only the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the computer.​
True
What percentage of Internet traffic, as estimated by Cisco Systems, will be devoted to video traffic by 2018?​
​79%
Programs that run independently and travel between computers and across networks, such as by e-mail attachment or virtually any kind of file transfer, are known as which option below?​

worms

In H.323, which protocol below handles call or videoconference signaling?​
​H.225
​Which version of DOCSIS provides 38 Mbps per channel and requires a minimum of 4 channels to be used?
​DOCSIS 3
​A reflective attack can be increased in intensity by combining it with what type of attack?
​amplification attack
An attack in which hackers transmit bogus requests for connection to servers or applications in order to harvest useful information to guide their attack efforts is known as what option below?​
​banner-grabbing attack
When using public and private keys to connect to an SSH server, where must your public key be placed?​
​In the authorized keys file on the host where the SSH server is.
Which software below combines known scanning techniques and exploits to allow for hybrid exploits?​
​metasploit
What type of device can be used to erase contents of a hard drive using a magnetic field?​
​degausser
A SOHO wireless router typically acts as a firewall and may include packet filtering options.​
True
The term malware is derived from a combination of the words malicious and software.​
True
Which software below serves as the firewall for Linux systems?​
iptables
TCP is preferred over UDP for real time services.​
False
CALEA requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities.​
True
The Spanning Tree Protocol stipulates that on any bridge, only one root port, which is the bridge's port that is closest to the root bridge, can forward frames toward the root bridge.​
True
A firewall typically involves a combination of hardware and software.​
True
​When using frame relay, what is the name of the identifier that routers use to determine which circuit to send frames to?
​data link connection identifier
The time period in which a change can be implemented is known as what option below?​
​maintenance window
​In ACL statements, the any keyword is equivalent to using what wildcard mask below?
0.0.0.0​
In an ISDN connection, what is the size throughput did a single B channel provide?​
​64 Kbps
​A SecurID key chain fob from RSA security generates a password that changes how often?
​every 60 seconds
What should be the first step of a response policy?​
​Determine if escalation is necessary
Every security policy should include a response policy, which specifically defines the characteristics of an event that qualifies as a formal incident and the steps that should be followed as a result.
True
A proxy that provides Internet clients access to services on its own network is known as what type of proxy?​
​reverse proxy
Which option below is an advantage of leasing a frame relay circuit over leasing a dedicated circuit?
​You pay only for the bandwidth you've used.
​Which virtual network type allows VMs to communicate with each other on the same host, but disallows communication with other nodes on the network?
host-only mode​
How can VLAN hopping attacks be prevented on a network?​
​Disable auto trunking and move native VLANs to unused VLANs.
An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.
True
The simplest type of firewall is a content filtering firewall.​
False
What type of software is a correction, improvement, or enhancement to a piece of software?​
​patch
In a PON system, an OLT contains a splitter that splits each port into how many logical channels?​

32

A computer that provides support for multiple H.323 terminals and manages communication between them is known as what term below?
MCU
At what layer of the OSI model do firewalls operate?​
​Network
A highly available server is available what percentage of the time?​
​99.99%
​What Layer 3 technology is employed by distance-vector routing protocols in which a router knows which of its interfaces a routing update and will not retransmit, or advertise, that same update on the same interface?
split horizon​
​An attack that involves a person redirecting or capturing secure transmissions as they occur is known as what type of attack?
​man-in-the-middle attack
What is the maximum amount of throughput provided by an OC-12?​
​622.08 Mbps